All About Our Technology

Latest Articles

Afraid
Technology

Data Leaks & Privacy Violations: It’s Okay to Be Afraid

Another large and egregious Facebook breach reminds us how unsafe our personal data really is.…
China Internet
Technology

Hello Big Brother

China requires facial recognition to access the Internet It is one of the most egregious…
Google Medical
Technology

Google has 50 million patient medical records, and that’s scary!

A whistleblower has revealed that 50 million patient medical records have been acquired by Google.…
Google microscope
Technology

How much does Google know about you? Here’s how to find out!

Google is watching you. It's how they make their money. In fact, the more they…

Read Our White Paper

A deep dive into Peer’s approach to decentralisation, encryption, event-driven, peer-to-peer (DEEP) technology. We’re building a social network that won’t exploit your data. At Peer Social we believe that decentralisation is the key to solving some of the most pressing technology problems of our time—starting with social media.Decentralisation is necessary if we want to restore the balance of power on the internet. We want to give users ownership of their data so they can empower themselves and make online, human-to-human connections without their data being compromised.

Download

Peer on Blockchain

Peer 2 Peer

Our first application is a collection of decentralised, encrypted, event-driven, peer-to-peer (DEEP) node clusters which are built on an adaptive mesh edge-computing network (AMEN) and will record data through distributed and immutable ledgers, utilizing Write Once Read Many (WORM) storage. Every user personally creates, controls, and stores their own encrypted ledger-based, adaptive network on their smartphone.

Data

Users will be represented by encrypted network node addresses—not names, email addresses, or telephone numbers. Usernames and passwords are stored locally on the user’s smartphone so there is no centrally stored username/password lists for hackers to target

Encryption

Using a decentralised architecture means that no communication is shared with any user unless they approve it first by sharing public encryption keys with the sender. This will empower users to moderate their own newsfeeds and take responsibility for their online social interactions while maintaining a double opt-in, closed personal network—ensuring the highest level of personal control.

Communication


Data and voice communication will be relayed directly between users with whom they have a shared encrypted connection. Each node will also contain a private, individualized, encrypted ledger which stores each connection and all subsequent communication as events—sorted by timestamp, and verified by other nodes on the network.

Get In Touch

Are you as passionate about decentralisation as we are? We are always looking for collaborators, contributors, and colleagues.